{"title":"Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis","authors":"A. Fedorchenko, Igor Kotenko, A. Chechulin","doi":"10.1109/PDP.2015.38","DOIUrl":null,"url":null,"abstract":"Integration of existing open vulnerabilities databases allows to increase the probability of detection of vulnerable software and hardware that are used in computer networks and improve the quality of security analysis. The paper is dedicated to investigation of open vulnerabilities databases and of process of their integration for further application in the security analysis system. The object of investigation is the process of integration of vulnerabilities databases. The main distinct of the designed integrated vulnerabilities database is its orientation to operative receiving of results of appropriate vulnerabilities search. The model of the process of the vulnerabilities database generation and the structure of the integrated vulnerabilities database are suggested. The description of the designed prototype and the results of its testing are outlined.","PeriodicalId":285111,"journal":{"name":"2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing","volume":"9 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDP.2015.38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Integration of existing open vulnerabilities databases allows to increase the probability of detection of vulnerable software and hardware that are used in computer networks and improve the quality of security analysis. The paper is dedicated to investigation of open vulnerabilities databases and of process of their integration for further application in the security analysis system. The object of investigation is the process of integration of vulnerabilities databases. The main distinct of the designed integrated vulnerabilities database is its orientation to operative receiving of results of appropriate vulnerabilities search. The model of the process of the vulnerabilities database generation and the structure of the integrated vulnerabilities database are suggested. The description of the designed prototype and the results of its testing are outlined.